Qld man charged over Bitcoin theft 
By Allie Coyne | Jun 25, 2014 | Comment Now 
Updated: Accused Riot Games hacker nabbed again.
 
Pure Storage buys 100 patents from IBM 
By Penny Wolf | Jun 20, 2014 | Comment Now 
Enters cross-licensing contract.
 
Tough NZ comms interception, network security law kicks in 
By Juha Saarinen | May 13, 2014 | Comment Now 
Aussie operators in NZ must register with police.
 
Oracle wins against Google in Java copyright case 
By Dan Levine, Diane Bartz | May 11, 2014 | Comment Now 
Decision "will definitely shake up software industry".
 
US, ICANN face opposition over transfer of internet address control 
Apr 3, 2014 | Comment Now 
Republicans want protections from foreign govt intrusion.
 
Kim Dotcom raid ruled legal 
By Naomi Tajitsu | Feb 19, 2014 | Comment Now 
Could make way for US extradition.
 
HP mulls legal action on Autonomy fraud claims 
 
Defence mulls surveillance malware export restrictions 
By Darren Pauli | Jan 15, 2014 | Comment Now 
Govts clamp down on zero day exploit trading.
 
Is your IP address personal information? 
By Brett Winterford | Jan 13, 2014 | Comment Now 
[Blog post]: The improbability of Privacy Act compliance, Pt 1.
 
BitTorrent to release a secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
BitTorrent readies alpha of secure P2P chat app 
By Juha Saarinen | Dec 20, 2013 | Comment Now 
Private instant messaging mooted.
 
French court shuts down video streaming websites 
Dec 2, 2013 | Comment Now 
Search engines, ISPs forced to block access to 16 services.
 
Apple wins US$290m from Samsung in patent retrial 
By Dan Levine | Nov 22, 2013 | Comment Now 
Apple takes this round in smartphone war.
 
TPP leak reveals hardline US position on IP 
By Juha Saarinen | Nov 14, 2013 | Comment Now 
Australian delegation sides with the US.
 
Telstra makes signal control changes in IP core 
By Ry Crozier | Nov 8, 2013 | Comment Now 
Brought on by 4G rollout.
 
FBI puts bounty on last alleged 'Ghost Click' conspirator 
By Darren Pauli | Nov 6, 2013 | Comment Now 
Five targets named in global cybercrime hunt.
 
FBI adds bounties to five alleged crackers, fraudsters and phreaks 
 
New Zealand's spying law passes 
By Juha Saarinen | Nov 6, 2013 | Comment Now 
Gives intelligence agencies a say in network procurements.
 
First P2P encryption kit gets PCI tick 
By Danielle Walker | Nov 1, 2013 | Comment Now 
Follows PCI SSC guidance.
 
Google launches personal proxy initiative 
By Juha Saarinen | Oct 23, 2013 | Comment Now 
US-level access and freedom of expression mooted.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  22%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1142

Vote